Location Privacy without Carrier Cooperation Keen Sung Brian Neil Levine Marc Liberatore School of Computer Science, Univ. of Massachusetts Amherst {ksung,brian,liberato}@cs.umass.edu Abstract—Cellular network operators can track the location of cell phone users as they connect to different towers. Operators may not directly control the user’s phone, but they do supply and control the SIM card that identifies the user. We seek to preserve a cellular phone user’s location privacy from cellular network operators. We propose the ZipPhone protocol for secure, virtual, and therefore easily changeable SIM cards. ZipPhone breaks the association between the user and IMSI identifier, and thus prevents the cellular operator from localizing the user. At the same time, it still allows authentication, billing, and E911 service by the operator. We empirically analyze the effectiveness of ZipPhone against a passive carrier. This class of attacker has a location profile of the user before they switched to ZipPhone, but relies on the normal operation of GSM mechanisms to learn the location of users. We reproduce the results of a previous inference study and show that it did not realistically model GSM carriers. We show that ZipPhone users can expect to be deanonymized only 6% of the time, which is a sixth of the rate reported by previous work. I. I NTRODUCTION Mobile device users depend on the cellular phone and data network infrastructure on a continuous basis. Cellular network operators can track cell phone users as they travel among and connect to towers, violating their location privacy. In this work, we propose a scheme to preserve users’ location privacy by allowing them to easily change virtual SIM cards over the Internet. This scheme, which we call ZipPhone1 , is backwards-compatible with existing cellular infrastructure. The difficulty of preserving the location privacy of cellphone users is that an entire infrastructure of densely placed radio towers can observe the phone’s signals. And although the cellular carrier doesn’t necessarily control the phone hardware, they do supply and control the SIM card carried by the user in their phone. SIM cards contain a small computer, protected by tamper-resistant packaging, able to process cryptographic functions and carrying a unique identifier. Despite this scenario, we believe location privacy is still possible. We detail a method for obtaining location privacy without the active cooperation of the carriers that control the cellular infrastructure. Rather than obfuscating the location of the user, our approach is to break the one-to-one link between user and SIM card, as the latter is what carriers use to identify users of localized handsets. As we will demonstrate, ZipPhone can provide location privacy from current carriers because their defenses are aimed at mitigating cloning, which is the unauthorized duplication 1 Our system is named for its parallels to the Zipcar rental system. In ZipPhone, the user doesn’t own the SIM, she rents it only temporarily as she moves around town. of the credentials stored in the SIM card; ZipPhone lends credentials rather than cloning them. If carriers targeted their defenses on ZipPhone the problem would be harder, since they might deny service to phones that appear to be running ZipPhone, or they might localize phones beyond normal GSM operation. At a high level, ZipPhone works as follows. ZipPhones do not have a SIM card. Instead, they access a remote set of credentials to instantiate a virtual SIM locally. The credentials are accessed using Wi-Fi or other networks not observable to the carrier. Once a virtual SIM is obtained, the usual GSM protocols are still able to handle switching among towers, refreshing virtual SIMs, and other details. In sum, our contributions are as follows. • We propose a backwards-compatible method of GSM location privacy that does not rely on the cooperation of the carrier. New credentials can be re-issued relatively frequently over the air. Our primary design relies on a cooperative but untrusted mobile virtual network operator (MVNO) that issues ephemeral identities and session keys. We also propose a variant of this system, which uses peer-based exchange of SIM credentials, and relies on flaws in the GSM system first discovered in 2001 and never fixed. We call this variant PeerPhone. • We propose a method of thwarting a class of active attacks on users that reveal their location. Such attacks are generally based on GSM pages for fake phone calls or SMS messages. Our solution is an application of portknocking [34]. • We empirically analyze the effectiveness of ZipPhone against a passive carrier. This class of attacker has a location profile of the user before they switched to ZipPhone, but relies on the normal operation of GSM mechanisms to learn the location of users. We reproduce the “conclusive” results of a previous inference study [41] and show that it does not realistically model GSM carriers. We show that ZipPhone users can expect to be denonymized only 6% of the time, which is less than a sixth of the rate reported by previous work. • We discuss other attacks against ZipPhone. First, we detail how carriers can determine that a phone is using ZipPhone and therefore deny it service. Second, we discuss active attacks based on localizing the phone without their cooperation (e.g., lateration attacks). In the next two sections, we review the operation of GSM networks and define our security model. We then present the details of ZipPhone, discuss its validity in terms of carrier terms-of-service, analyze its security, and place it in the context of related work. 2 II. S UMMARY OF GSM N ETWORKS Cellular carriers use one of a few technologies to support mobile phones. In this section, we give an overview of the details of the GSM system and terminology [54], and the aspects of the GSM architecture that are required for our discussion of ZipPhone. ITM-2000 based systems have differences but largely follow the same general architecture; GSM is the foundation of GPRS, WCDMA, EDGE, UMTS, and LTE. Moreover, most networks support reverting to a GSM mode. A phone handset is known in GSM as a mobile station (MS), and each is composed of its mobile equipment (ME) and its subscriber identity module (SIM) card. To connect, the handset connects via its radio interface to a radio tower, which is called a base transceiver station (BTS). A single base station controller (BSC) can manage many BTSs, including functions related to resource and mobility management. The BTS and BSC form the base station subsystem (BSS). A. Connecting to the Network Each BSC is connected to one mobile switching center/visitor location register (MSC/VLR); see Fig. 1. The MSC/VLR controls call setup and routing, among other tasks. One MSC/VLR connects to many BSCs. Each MSC/VLR is also connected to the carrier network’s home location register (HLR), which records the particular MSC/VLR where each phone subscriber may be found. The HLR is associated with an authentication center (AuC) that stores cryptographic credentials needed for communicating with each of the carrier’s SIM cards. Each SIM card contains an international mobile subscriber identity (IMSI) and a unique symmetric key Ki . The same IMSI and key pairing is stored in the AuC. Generally, SIMs do not allow querying of the key. Each ME contains an international mobile equipment identity (IMEI) number, that is comprised of a unique serial number and the make, model, and place of manufacture of the phone. When a phone is powered on, it scans for BTS towers available from the carrier specified in the SIM, each on a different frequency. To connect to the network, the phone begins a location update process by selecting the tower with the strongest signal and then requesting a communications channel from the BTS. As part of the process, the handset sends its IMSI to the MSC via the BTS. (If requested, the handset will also send its IMEI.) The MSC will request authentication information from the HLR/AuC with a mobile application part (MAP) send authentication info message for this particular IMSI. MAP is the internal signaling protocol for GSM nodes. To generate a response, the HLR/AuC selects a random number and combines it with the IMSI’s Ki to generate a session key (Kc ) and a signed response (SRES), using a given algorithm. The three values (called a triplet) are returned to the MSC/VLR. The MSC forwards, via the BTC, only the random number to the handset. The handset asks its SIM to generate the signed response that corresponds to the random number (for the given algorithm), and forwards the value to the MSC/VLR via the BTS. The SIM also generates Kc for the phone from the random number. AuC HLR MSC/ VLR MSC/ VLR BSC BSC BTS Fig. 1: The simplified GSM architecture. If the value matches, the handset is authenticated, and the MSC sends a MAP update location message to the HLR. The HLR associates the IMSI with the address of the MSC/VLR. The MSC then tells the BTS the session key, and then the phone and BTS switch to an encrypted channel. The MSC assigns and sends the phone a temporary mobile subscriber identity (TMSI) that is unique to the location area it resides in. Although the TMSI is sent encrypted, it can be retrieved from the SIM on some phones and there are scenarios where it is broadcast over the network unencrypted [35]. Finally, the phone releases the communications channel. It is now camped on a cell and is ready to use the network’s services. For example, incoming calls from the public switched telephone network are routed through the HLR, then the MSC/VLR, and after a broadcast page, from the BTS to the handset. B. Moving to a new location area As the user moves within the cells that comprise a location area, it can use the same TMSI to access the network. Once the handset moves to a new location area, it must begin the location updating process again, though it can send its TMSI (and old location area) instead of the IMSI. If the TMSI value is already known to the MSC/VLR, the location update will be accepted without re-authentication. A new TMSI will be assigned, unique to the new location area. If the location area was managed by a different MSC/VLR, then the handset’s credentials must be reacquired. It is preferred for the MSC to request the associated IMSI from the previous MSC/VLR, rather than directly from the handset. The new MSC/VLR also retrieves a triplet from the HLR and may ask the phone to re-authenticate with a new signed response. C. Data access GPRS provides data service for mobile phones, and it is the basis for UMTS architectures [3]. The protocol for activating data service is called a GPRS attach. The process is similar to a location update, and we only sketch the details. After requesting and receiving a channel, the MS sends an attach request to its BSS. The BSS forwards the request to a serving GPRS support node (SGSN), which fetches authentication triplets from the HLR. Once the 3 MS authenticates itself based on knowledge of Ki , an encrypted channel is started between the SGSN and the mobile. The SGSN exchanges information with the HLR about the authenticated handset, and the attach is accepted and acknowledged to the handset, including issuance of a packet temporary subscriber identity (P-TMSI). The process will be repeated if the handset moves to a location area controlled by a different SGSN. UMTS data access is essentially the same in terms of the signaling to the handset and the authentication mechanisms. III. S ECURITY M ODEL Our security model consists of users seeking location privacy from cellular carriers. Users carry and control phones that are equipped with cellular and Wi-Fi radios, and thus have IP-based data connections on both radios (once connected). They are allowed to use encryption, which we assume is reasonably strong. Users are not trying to gain unauthorized service. Our model includes carriers that are passive or active attackers. Passive Attacker. A passive carrier controls the network infrastructure, accounts, and SIM cards. They can ensure that only authorized accounts are used to connect to the network. They know the incoming and outgoing calls of each phone and can observe data packets sent via the phone’s cellular connection (but not the contents of encrypted traffic). The passive attacker has records of which towers a user’s phone has associated with during voice and data transfers, and knows the location of each of its towers and its coverage area. The attacker cannot force the phone to answer requests (e.g., pages). The carrier and SIM cards make use of GSM protocols including the A5 family of ciphers and their existing weaknesses. We also allow the passive attacker to leverage past information about user geographic movements to build a profile. Networks with an always-update policy expect phones to perform a location update whenever the phone enters a new cell; operators never enforce such a policy because it has the highest overhead for the carrier [48], [61]. The standard is for phones to perform a forming location area (LA) update [48], [61], where a phone initiates a location update only if its location area changes. In that case, the carrier will learn the exact cell that the phone is associated with only when it (i) performs the location update or GPRS attach, (ii) connects to a BTS to make a call or send data, and (iii) answers pages for incoming calls or data. The passive attacker does not falsely or unnecessarily prod the user into performing a location update or similar attacks. Active Attacker. The active carrier has all the abilities of the passive attacker and can attempt real-time geolocation a specific phone, including unnecessarily asking the phone to initiate a location update process and multilateration of the received phone signal. We do not consider certain other active attacks due to either their fragility or their extreme cost when applied on a network-wide scale. For example, we do not allow either attacker to use cameras or other visual information, nor to physically stalk the user. Because the carrier does not control the phone hardware or OS in our model, only the SIM, it cannot, for example, insert SSL keys onto the phone or otherwise change the phone’s software. Similarly, the carrier cannot prevent Wi-Fi connections, nor capture information from the phone’s Wi-Fi, key presses, camera, GPS, or screen. Handset signatures. Phone hardware has been shown to carry many unique signatures that can be determined remotely, including the radio’s power amplifiers [45], [46] and the phone’s accelerometer [15]. Although these attacks can be effective, they are not the focus of this paper. To obtain privacy, users need both the protocol we propose presently, and defenses against remote inference of physical signatures. IV. Z IP P HONE Cellular users are subject to several vulnerabilities that reveal their geographic position, though some are easily mitigated. First, phones store a unique IMEI, which is akin to a MAC address; however, this identifier can be modified by the user since she controls the handset hardware2 . Second, each user is likely identifiable by the unique set of outgoing calls they make; however, they can make calls via VOIP rather than using the cellular carrier. Encryption of the VOIP stream can thwart carrier eavesdropping. Stronger protection is available by using VOIP over Tor3 . Third, as our past work has shown, their location may been inferred from throughput characteristics, [55], though such attacks are limited, currently. A naive privacy solution is offered by some mobile virtual network operators (MVNOs), such as TracPhone, Straight Talk, and Boost Mobile. MVNOs have no cell tower infrastructure. Instead, they buy service wholesale from carriers and resell to customers. Many MVNOs allow users to purchase a so-called “burner phone” and a SIM with pre-paid minutes, which can be disposed of by the user; such purchases and activations do not require a name or address. This approach to privacy works well for those willing to sacrifice a great deal of convenience and money for privacy, but it does not scale to improving the location privacy of every day cellular users that are seeking not to be “observed in all matters” [51]. In the remainder of this section, we identify vulnerabilities that stem from the use of a specific IMSI (stored on a tamper-proof SIM) and the geographic consistency of IMSIs (which in practice are typically tied to a home, workplace, or both). We then detail our approach to mitigating these vulnerabilities. A. Authentication and Location Updating The most naive approach to obfuscating the relationship between a user and a geographic trace of a phone by a cellular network is purchasing a pre-paid SIM card from an MVNO such as TracPhone, and replacing both it and the phone after a short period of time. A slightly better approach is for users to meet up in a cafe and randomly switch SIM cards and phones. Of course, neither approach is remotely 2 See https://www.blackphone.ch/ for a recent attempt at a handset designed around consumer privacy. 3 See http://torfone.org/ 4 HLR AuC HLR Gateway AuC MSC/ VLR BSC BSC MVNO M Internet/ TOR p2p SIM exch. MNO/Carrier phones/users BTS Fig. 2: The ZipPhone architecture for authentication and attachment to the network. convenient. Further, such a scheme is not secure unless we can quantify how often a user should swap hardware. ZipPhone allows for convenient exchange of logical cellular identifiers. It is based on phones without local SIM cards; instead, the phone’s software retrieves a virtual SIM offered by Internet-accessible third party; see Fig. 2. Carriers that control infrastructure, such as Verizon and AT&T, are generally called mobile network operators (MNOs). They market and sell service directly to consumers. MNOs also have a large wholesale business servicing MVNOs, which are explicitly allowed to resell service from an MNO. An MVNO has no national BSS infrastructure, but may issue SIMs and operate an HLR and AuC. About 100 MVNOs operate in the US alone [60]. ZipPhone is based on a centralized MVNO solution, though the operator is not trusted with identities. Below, we also detail a variant called PeerPhone which is decentralized. ZipPhone is a more secure solution than PeerPhone, but the former has the disadvantage that a business relationship with a major carrier is required. Authentication. Any existing or new MVNO that operates an HLR and AuC could easily support the ZipPhone architecture. We assume that such an organization is cooperative (it does not launch denial-of-service attacks) but is not trusted by the ZipPhone users with their locations or identities. Let’s call one such MVNO Zipline. Like any MNVO today, Zipline customers roam on the network of a partnering MNO. There are two key differences between Zipline and current MVNOs on the market. First, Zipline customers are not issued physical SIM cards; instead they anonymously request ephemeral IMSIs and IMEIs from Zipline’s SIM Exchange during bootstrap (e.g., via Wi-Fi). IMSIs are ideally issued as nonces, but could be reused over time. IMSI requests are paid for (over Tor) via a suitably anonymous currency such as Bitcoin [42] or Zerocoin [39] in which no consistent ID is needed. Using Tor increases the difficulty of a SIM holder inferring that two ZipPhone requests originated from the same user. We can assume the leases are for some number of minutes at a time. The MVNO will know when the lease is initiated because it will receive an authentication request from the MNO. To terminate the lease, Zipline can send a message to the MNO’s VLR, as per current GSM standards that exist to support the existing pre-paid plans of MVNOs. Second, Zipline customers prefetch the correct answer to the next several SRES values. SRES prefetching has two key advantages: (i) it removes any long delays during signaling that identifies the phone as participating in ZipPhone, preventing expiration of GSM timer T3260 [2] and reducing the possibility of detection by the carrier; (ii) it ensures that the phone can perform location updates while in the field without a separate Internet connection. New purchases and prefetched triplets can be made anonymously over the data channel even if out of range of the initial Wi-Fi base station. No aspect of Zipline requires any changes to the GSM architecture. While it does require cooperation of a sponsoring MNO, what we propose does not violate the terms of wholesale service of major carriers to their MVNOs. It is not necessary for the MNO to know that the MVNO is running ZipPhone. It is not out of the ordinary for an MVNO to run its own HLR/AuC. If a current MVNO implemented this architecture, a partnering MNO would be unable to easily distinguish customers with physical SIMs from those leasing remote SIMs. Location Updates. Conveniently, as the user moves to new BTS towers and even new location areas, the TMSI will be refreshed without re-authenticating, as noted in Section II-B. The carrier will require the phone to re-authenticate only when a location area operated by a new MSC or SGSN is reached. These regions can be large, as cells range from about 1 to 100 km2 , one BTS manages several cells, and one MSC (or SGSN) manages several location areas. When re-authentication is required, ZipPhone users use prefetched values. To make and receive phone calls, we assume the ZipPhone user has registered with an (anonymous) VOIP service, as described in Section IV-C. A significant limitation of ZipPhone is that the user cannot utilize the legacy phone system and reasonably expect to retain location privacy. However, E911 service, which is tied to a handset and not a user or SIM, would be still available if needed. B. PeerPhone: Peer-based exchange of SIM credentials To our knowledge, no current US-based MNO or MVNO allows the resale of their services by their end-users4 . Customers of these operators may still wish to obfuscate their movement by occasionally lending their SIM to others for use without recompense. We call this variant scheme PeerPhone, and differentiate it from ZipPhone as needed in the remainder of this paper. Lending an authorized phone and SIM, virtually or physically, does not appear to be against the Terms of Service of major carriers. This lending makes sense only for persons with unlimited data and call plans. Authentication. A user that has been lent a SIM must be able to answer the challenge-and-response authentication 4 Verizon’s consumer Terms of Service: http://www.verizonwireless. com/b2c/support/customer-agreement. AT&T’s: http://www.att.com/ shop/en/legalterms.html?toskey=wirelessCustomerAgreement; TMobile’s: http://www.t-mobile.com/templates/popup.aspx?PAsset= Ftr Ftr TermsAndConditions&print=true. 5 protocol posed by the carrier: PeerPhone relays the challenge to the SIM owner over Wi-Fi. This approach is successful because the GSM SIM security protocols require and ensure only that the SIM is authorized to use the network (as described in Section II-A), rather than requiring it is physically connected to the handset. The remote SIM holder is able to provide session key Kc and the SRES responses to the phone. Because Ki does not need to be passed, the SIM’s use can subsequently be lent out to another user. Relaying the carrier’s packets across the Internet via Tor to the SIM holder will introduce significant delays. However, because carriers expect to work with resourcepoor phones and do not wish customers to find it hard to connect to the network, the GSM protocol is not stringent. The GSM specifications set a 12-second timeout by default on receiving a response to authentication requests within a location update process (GSM timer T3260 [2]). If the timeout occurs, the user can simply try again. The termination of the remote use of a SIM (and its IMSI) is easily controlled by the SIM owner, who need only connect to the carrier and perform a location update. In doing so, the HLR of the carrier will remove access from the previous or current MSC/VLR. A SIM owner can leave an extra Internet-connected phone at their house or other preferred location (perhaps with the actual SIM) and instruct it to connect to the network remotely; this setup allows the owner to reclaim without necessarily revealing their current location. Retrieving Credentials from a SIM. Users that wish to participate in PeerPhone and lend out use of their SIM must retrieve the Ki key stored in it, though it only needs to be done once. They can then produce the Kc and SRES values for a remote PeerPhone requester, who can relay via Wi-Fi (or existing cellular connection) the random number issued by the carrier to the peer during a location update. Keys for encryption with GPRS/EDGE are also based on knowledge of Ki and can be similarly relayed. The peer should never relay the value Ki . To recover Ki , peers can launch one of many known plaintext- and ciphertext-only attacks [5], [10], [47] against the various A5 encryption algorithms used by carriers. Barkan et al. [5] show how to recover the key in seconds from small amounts of ciphertext for both voice and GPRS communication for A5/1, A5/2, and A5/3. Almost all networks use A5/1 or no encryption at all (which is called A5/0) [52], [56]. (A5/2 is so weak that it is no longer allowed on GSM networks.) All communications and all algorithms on a GSM phone are based on Ki ; as long as carriers allow any portion of their communications using A5/1, the peer can recover the key by bidding down from the stronger A5/3 algorithm to A5/1 during negotiation (which is the basis of many commercial surveillance products [4]). In December 2013, Deutsche Telekom upgraded from A5/1 to A5/3, but still allows breakable connections via A5/1 from phones [40], and to date it has announced no changes to its US-based operation, T-Mobile. AT&T has announced it will upgrade to “parts” of its network, but because it will still allow A5/1 connections, peers can recover their Ki values [56]. By handing out Kc , the remote PeerPhone user can use the same attacks to recover Ki , but that vulnerability is already exploitable by all attackers that are within radio range of the SIM holder; it is no weaker to lend Kc to remote parties than it is to use the carrier’s network in the first place. A5/1 was first shown to be weak in 2001 [10] — more than a decade ago — but this revelation has resulted in no deployment changes by carriers. Notably, smart phones on the market are close to having more resources than the PCs first used to carry out these attacks in 2001 (128 MB RAM and 146 GB storage [10]). Location Updates. A PeerPhone can use its TMSI values to move among BTSs and location areas. When a location area is reached that is controlled by a different MSC or SGSN, the phone must reauthenticate. In that case, the PeerPhone must connect over the existing cellular data connection to the SIM holder. In some cases, the PeerPhone will be able to use its existing connection on the old tower to relay packets back to the SIM holder. To do so, it will need to switch its frequency several times to act as a relay; most phones can do so quickly as they are constantly switching frequencies to test received signal strength (to determine if a handoff is necessary, even during a voice call). If this back-and-forth cannot be completed reliably in practice, a PeerPhone can be engineered to consist of better antennas to allow more time for the relayed location update process to take place. In the worst case, a phone can be built with two radios to avoid the delay of frequency switching. In this preliminary work, we have not evaluated the efficacy of these mechanisms. C. Preserving Privacy During Communication By initiating and receiving overt GSM or unencrypted VOIP calls, ZipPhone users risk being identified via a profile of call records held by the carrier. Some protection is gained from using an encrypted VOIP service since it would not reveal to the carrier the identity of the user, whom she calls, or from whom she receives calls. If the VOIP service itself cannot be trusted, then an anonymous VOIP service is required, such as Torfone. Anonymous VOIP has a performance penalty [36]. An additional threat is posed by several attacks that request the user’s phone to silently associate with a real or unauthenticated tower [22] based on an SMS Class 0 message, ICMP ping, or similar technique. The general approach of these attacks is to page the phone, and once the phone is associated to a cell, the call is abandoned. It’s easy for ZipPhones to ignore all incoming calls and SMS messages, but since legitimate incoming VOIP calls are first received as pages for incoming data packets, a similar attack exists based on pages for GPRS data. Thwarting Fake Cellular Pages. We propose an application of portknocking [14], [34] to defend against these attacks. The defense, which we call pageknocking has the limitation that it is easily subject to a denial of service attack by the carrier, and the user can’t deny that it is using the defense (and therefore also using ZipPhone). We assume that the user is registered to an Internetbased proxy service that accepts incoming VOIP calls and anonymously forwards the calls to the user. (We assume the registration process also creates the necessary entry in the carrier NAT table.) To signal to the user that an incoming 6 packet is genuine, the service uses a notification coded in a series of intervals between pages. More generally, this defense can be used for all incoming GPRS traffic to the phone if a proxy, VPN concentrator, or Tor node understands the protocol. In fact, a limitation of the approach is that, because unrelated incoming traffic can corrupt the signal, all traffic to the peer should be routed through one Internetbased proxy (or Tor-based service). The phone waits for incoming VOIP calls via pages on the GPRS tunneling protocol (GTP). The phone waits in standby mode, which allows the carrier to know its location area for routing data, but not the specific cell nearest to the phone. Ahead of time, the service and the user agree upon a key and a parameter n. The key can be renegotiated at any time but we refer to the current key as g. A sequence of n bits is chosen as the first n bits of the hmac [6] of the key and the current time t, synchronized to the current minute: hmac(g, t). The bit string determines a sequence of transmits and pauses. For each bit that is set, the service transmits a data packet, which results in a GTP page to the phone, and then the service pauses for a duration of d seconds. For each bit that is clear, a packet is not set and the service pauses for d seconds. The duration of d must be long enough to ensure that a new page will be generated by the carrier when a new packet comes in, but not so long that the chances of another packet being received is significant. The chances that the carrier (or non-malicious third party) can generate a false n-bit page is 2−n . At the receiver end, when a page is received at time t0 , the user calculates the first n bits of hmac(g, t0 ), and holds t0 constant until the pattern doesn’t match. If they do match, the phone responds to the page. The value of d limits the number of incoming VOIP calls (and data packets generally) that a user can receive per minute. However, since the pattern changes once per minute, the number of chances that a third party has to brute force the value g is extremely limited. The protocol does not limit the amount of communication that the user can initiate. al. assume an always-update location management policy in which the user performs a location update with the carrier for every cell it enters. As we show, a more realistic model of carrier location management based forming LA updates (see Section III) predicts such identification attacks are much less successful than previously reported. For example, when users change identifiers once an hour, attackers succeed only 6% of the time. The code for our simulations is available from http:// traces.cs.umass.edu. V. PASSIVE ATTACK A NALYSIS In this section, we characterize the effectiveness of the passive attacker against ZipPhone (and PeerPhone). We ask, What percentage of the time can the passive attackers determine the identity of a ZipPhone user, given a profile of that user trained using overt data? Past work is pessimistic about the success of methods for location privacy that are based on changing identifiers. For example, Mulder et al. [41] previously examined the accuracy of techniques that infer the identity of a cellular user given a month-long training period and varying frequency of changing IDs. In that paper, they expected that IDs could be changed as infrequently as once a month or as often as once an hour. Attacker identification rates were as high as 88% for monthly changes and 48% for hourly changes; the paper remarks that “this work conclusively demonstrates that removing identifiers from location information, or merely blurring the spacial resolution, does not eliminate the danger of deanonymization.” Below, we reproduce their classification method and evaluated the same data set [17], and then perform a critical additional experiment. Mulder et Self-transitions are ignored (i.e, P r(kp,p ) = 0). We include a smoothing factor by adding 1 to each of the counts of all possible transitions before computing Eq. 1. During testing, a window of M minutes of data from a single user is randomly selected from the held-out test data set. A contiguous sequence of cells θ = x1 , x2 , . . . , xn ; xi ∈ S, consisting of n cells visited by an unknown user, is taken in chronological order from within that window. The sequence of n − 1 transitions is evaluated against the values stored in the matrix for each user. An indicator is defined for each user k as the product of all probabilities in the associated training matrix. The user with the maximum value of Ik is selected by the classifier. A. Empirical Analysis of Passive Attackers Given the ubiquity of cell phones, it is reasonable to expect the carrier to already have a profile of its users. Therefore, our evaluation of ZipPhone in the presence of a passive attacker assumes that the training data is easily accessible. We cross-validated our results using three test/train month pairs, encompassing the majority of the Eagle et al. [17] data set. The data includes the location areas, cells, and a record of calls made by 106 users between November 2004 and February 2005. Because ZipPhone allows for users to obtain new IMSI values over the air, it’s reasonable to expect that they can change identifiers fairly frequently. We have not implemented ZipPhone, and so we cannot guarantee any particular frequency. But for the sake of comparison, we show results for a frequency as (impractically) low as once a minute. Inference Algorithm [41]. The inference approach designed by Mulder et al. is summarized as follows. During training, a square transition matrix Pk is created for each user k. For a set of all states S visited by all users, the matrix encodes the probabilities that a user in cell p moves to cell q for all p, q ∈ S. P r(kp,q ) = P Count(p → q) 0 q 0 ∈S\p Count(p → q ) arg max Ik = k n−1 Y P r(kxi ,xi+1 ) (1) (2) i=1 While this model does not consider stationary location data (i.e. self-transitions), Mulder et al. found this approach more successful than a more sophisticated Markovian model that we did not reproduce. 7 80% ● ● Attack Accuracy 70% ● ● 60% Always−update Forming LA Location Area Only ● ● 50% 40% ● ● 30% ● ● 20% ● ● 10% ● ● 0% ● ● ● 1 month 1 week 1 day 1 hr 1 min Trace Duration (minutes) Fig. 3: The accuracy of the attack defined by Mulder et al. [41] under the always-update policy (top, red line) and forming LA policy (middle, green line). Our results match well with [41]: an attacker achieves a 38% success rate against users that update their SIM-based identifiers once an hour. Under the latter, more realistic, forming location area update policy, the attacker’s success rate falls to 6% when SIM-based identifiers are updated once an hour. The bottom, blue line shows the lower bound on any scheme: it represents an unrealistic location management scheme where the carrier learns only the location area but not the cell a user is associated with. Errorbars represent 95% c.i. The results for a forming update location management policy are shown as the middle, green line in Figure 3. For a one-month sequence of locations — corresponding to changing IDs via ZipPhone once a month — accuracy falls by more than half, as compared to always-updating, to about 34%. For a one-hour sequence of cell transitions, accuracy is at 6%. As an impractical lower bound, we also show results for assigning new IMSI IDs after each cell transition. In that case, the attacker will succeed with less than 1% accuracy. The bottom, blue line shows the lower bound for this inference technique at each trace duration: it represents an unrealistic location management scheme where the carrier learns only the location area but not the cell a user is associated with. Limitations. We focus on the algorithm in Mulder et al. because it is a simple approach that is designed for GSM networks, and a universally accepted result. In future work, we plan to evaluate additional inference algorithms. The Eagle et al. data is relatively small; it has the advantage of containing cell IDs and call records for individual users (c.f., taxi cab data with no user-level consistency or call records). But we seek to expand our evaluation of ZipPhone to larger data sets. Finally, we hope to implement a version of ZipPhone using OpenBSC to understand the costs and limitations of frequent identifier updates. Additional attacks on ZipPhone are discussed in the following section. VI. D ISCUSSION : OTHER ATTACKS ZipPhone is vulnerable to at least two other major sets of attacks6 , which we discuss in this section: enumeration of all phones participating in ZipPhone; and active localization by carriers against phones in-between forming LA updates. In this preliminary work, we discuss each of these attacks, and leave empirical analysis for future work. Results. The effectiveness of the classifier is shown in Figure 3. In all cases, the attacker is given a preceding month’s data as ground truth for training. The top, red line is a recreation of results from Mulder et al.: a randomly selected 1-month-long sequence of the cells a user is associated with results in a high accuracy of 80%; Mulder et al. saw5 about 82%. A random sample of up to 1-hour of cell locations is identifiable 38% of the time; Mulder et al. saw about 44%. In both cases, random chance would be correct about 1% of the time. Mulder et al.’s results are pessimistic in that they are for an always-update scenario, which is never implemented by carriers in practice [48], [61]. The attacker’s accuracy is much lower for a more realistic forming update policy, where the carrier only learns the exact cell that the phone has associated with when the mobile device performs a location update — the device performs an update only upon entering a new location area or receiving a call (rather than upon entering each cell within a location area), or when the carrier initiates a connection. Fortunately, Eagle et al.’s data includes a record of calls for each phone. In our simulations, we conservatively assume that phone call duration is an average of 3 minutes long [62]. A. Identifying SIMs Participating in ZipPhone In many but not all cases, a carrier can determine which SIMs on its network are running ZipPhone or the PeerPhone variant. Once identified, the carrier may elect to deny service to these users. In sum, the centralized protocol (e.g., an MVNO such as Zipline, running the ZipPhone protocol) is immune to most simple attacks, yet does not require the user trust Zipline. First, the carrier can attempt to enumerate all SIM cards that are participating in the system. Enumeration is possible in PeerPhone if all venues where peers advertise their interest in lending credentials can be found and joined. This enumeration is not possible with an MVNO, unless it repeats IMSI values or colludes with a carrier. Second, the carrier can compare the latency of a handset in responding to network signaling to others on the network. It should be significantly greater if a remote SIM is actually being contacted to complete authentication signaling. In the ZipPhone MVNO-based case, the values can be prefetched, defeating this attack; in PeerPhone exchange, they cannot be prefetched. 5 These small differences are due to our use of an additional month from the data set. 6 Another risk we do not discuss is the physical danger of assuming another user’s credentials [50]. 8 Third, the carrier can observe the locations (i.e., cells and sectors) where a SIM card is being used and look for SIMs that follow a geographic pattern that is not typical, for example, jumping from city to city or country to country faster than a person can reasonably travel. PeerPhone might make this attack easier because the SIM will always return to its home location when a lending session terminates — unless the user only uses the SIMs of others via a fair exchange protocol. Zipline would not be subject to this attack since it has the option of never reusing an IMSI. Fourth, a carrier can isolate those users that never receive a phone call and always use VOIP. In the MVNO case, again this analysis might not be effective if the IMSI is never used again, but would still raise suspicion depending on the length of time the IMSI is active in the network. As a defense, a user could place phone calls occasionally to arbitrary numbers (e.g., libraries or businesses) but we don’t consider such a defense here. Finally, whether in the peer-based or MVNO scenario, any phone that is engaging in the pageknocking defense against an active attacker described in Section IV-C will be fairly obvious. Only AT&T and T-Mobile have deployed U-TDoA. (Most European operators use Cell ID.) In practice, there are limits on the carrier’s ability to track all users via multilateration. Ficek [21] has shown some of these limits. For example, to locate a user via a false SMS message, a series of signals and the GSM broadcast paging channel are needed. These resources limit the number of users that can be tracked per minute to very low numbers depending on various parameters, e.g., tracking more than 20 users out of 410 exceeds network capacity. During the tracking, phone calls and data traffic that rely on the broadcast channel must be delayed. In future work, we plan to evaluate the effectiveness of these two strategies and the cost to the carrier in terms of broadcast capacity. B. Active Attacks Location Based Services. First, papers on privacypreserving location-based services (LBS) generally assume that the user is submitting queries for service. For example, the user may query for the nearest restaurant or gas station. Cellular networks are an LBS in that the user’s query is a request for mobile voice or data service (rather than content) from a tower within radio range. Not all solutions and analyses of privacy-preserving LBS are easily applied to the cellular scenario. Cellular users cannot introduce a trusted intermediary to obfuscate the mobile’s position or introduce fake queries to the carrier [38]. Solutions that assume the user can control the level of granularity of their location are also not applicable [63]. Past work on deanonymization of private traces of mobile users assume the user’s pseudonym is unchanged throughout the trace. A small amount of external information, such as the person’s home or work address [28], can deanonymize an obfuscated trace [7], [8], [24], [32], [37], [41] given a consistent identifier. In contrast, we strive to change pseudonyms as often as network resources can support, which may be in minutes. Indeed, work by Zang and Bolot [65] shows that suitably anonymizing a trace of 25 million cellular users across 50 states (30 billion records total) requires only that users have the same pseudonym for no longer than a day. A day’s duration is unsuitable for Zang and Bolot’s goal of supporting researchers that wish to characterize the behavior of users over time (while maintaining their privacy). On the other hand, the result is promising for users seeking privacy, who might be able to change their pseudonyms much more frequently than once per day. Others solutions can be adapted to our cellular scenario. A cellular user can use mix zones [8], [23], abstain from service [9], and introduce some types of false information [31], [53]. The active attacker’s success depends on the method and quality of localization used, and the frequency with which they localize each user. Most studies of cellular localization assume the phone itself participates in localization, which is more accurate (e.g., [13], [58]) but is not available against a ZipPhone user, according to our attacker model. Other studies assume that the phone is coerced into revealing its location [16], [21], [22], but we expect that such an attack can be thwarted by pageknocking, though we do not evaluate the defense here. Accordingly, active carriers have two main options: Localization based on Cell ID. The carrier may localize the user based on the Cell ID it is associated with. A phone always knows its Cell ID, but the carrier learns the Cell ID of a phone only when it uses voice or data services. Cells themselves can vary greatly in size, from 100 km2 to 1 km2 (or smaller if dedicated to a single home or business). Trevisani and Vitaletti [57] performed in-field experiments in the US and found that Cell IDs are offset from the true location of the mobile by about 0.8 km in an urban environment (Manhattan), 0.5 km in a suburban environment, and 2.9 km in a highway environment. Watzdorf and Michahelles [59] report similar results. Ficek [22] reports accuracy of 0.05–20 km. Localization based on multilateration. The carrier may use the Uplink Time Difference of Arrival (U-TDoA) method of multilateration. In U-TDoA, the carrier tracks the time it takes for the same signal to reach its network of base stations. The error is much lower than Cell ID at 0.11 km in tests [1] (Ficek [22] reports 0.04–0.12km). However, deploying U-TDoA requires a massive upgrade to the network infrastructure [22]. Accordingly, CDMAbased carriers, Verizon and Sprint, have instead deployed assisted GPS (aGPS), which requires participation from the phone, and thus must use Cell IDs for passive localization. VII. R ELATED W ORK There are hundreds of papers on location privacy [25], [33] for mobile users, spanning a number of paradigms from indoor mobile ad hoc networks to outdoor cellular networks, and from queries for information to friend-finding services and social network check-ins. Very broadly, the papers most related to our work fall within two key topics. Location Privacy for Mobile Users. Secondly, many works address cellular location privacy. In contrast to our work, 9 most assume the carrier is willing to deploy changes. Some focus on enlisting a (trusted) carrier to protect against a third party [20], [26], [27], [35]. Reed et al. [49] propose privacy from the carrier using onion routing, but does not consider the direct connection that must be made to a tower. Federrath et al. [19] propose a similar scheme that prevents linkability of calls between two parties but omit critical details regarding authentication to the carrier. Fatemi et al. [18] propose an anonymous scheme for UMTS using identity-based encryption, but unlike our approach, that scheme involves the carrier in the cryptographic exchange; they enumerate the vulnerabilities of similar works [29], [44], [64], [67]. The closest work to ours is Kesdogan et al. [30], which proposes using a trusted third party to create pseudonyms for GSM users, but also routes all calls through that provider, which allows it to characterize the calling pattern and infer the caller. Anonymous VOIP. The TORFone project (http://torfone. org/) has implemented a TCP-based voice-over-Tor system. (Others have examined the feasibility of real-time traffic over TCP [11], [12], [43], [66].) Our prior work has characterized the performance of a multi-hop/Tor-like UDP-based voiceover-IP, and shown it performs with sufficient quality of service despite the three-hop paths [36]. VIII. R EFERENCES [1] 3GPP. TS 45.811: Feasibility Study on Uplink TDOA in GSM and GPRS. http://www.3gpp.org/DynaReport/45811.htm, July 2007. [2] 3GPP TS 04.08 version 7.21.0. Mobile radio interface layer 3 specification. http://www.etsi.org/deliver/etsi ts/100900 100999/ 100940/07.21.00 60/ts 100940v072100p.pdf Default time values on page 574. [3] 3GPP TS 23.060 version 11.7.0. Universal Mobile Telecommunications System (UMTS); General Packet Radio Service (GPRS); Service description. http://www.etsi.org/deliver/etsi ts/123000 123099/123060/11.07.00 60/ts 123060v110700p.pdf. [4] Advanced Surveillance Technology, Inc. Wide-area (spiderweb) passive interception system. media.wix.com/ugd/70bfc5 619d9e6fc11df018f9af893328e798dd.pdf. [5] E. Barkan, E. Biham, and N. Keller. Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Journal of Cryptology, 21(3):392–429, Mar. 2008. [6] M. Bellare, R. Canetti, and H. Krawczyk. Keying Hash Functions for Message Authentication. In Proc. Advances in Cryptology, volume 1109 of LNCS, pages 1–15. 1996. [7] A. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46–55, 2003. [8] A. Beresford and F. Stajano. Mix zones: user privacy in locationaware services. In Proc. Pervasive Computing and Communications Wrkshps, pages 127–131, 2004. [9] L. Bindschaedler, M. Jadliwala, I. Bilogrevic, I. Aad, J.-P. Hubaux, V. Niemi, and P. Ginzboorg. Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. In Proc. ISOC NDSS, Feb. 2012. [10] A. Biryukov, A. Shamir, and D. Wagner. Real Time Cryptanalysis of A5/1 on a PC. In Proc. Intl. Wrkshp on Fast Software Encryption, pages 1–18, 2001. [11] E. Brosh, S. Baset, V. Misra, D. Rubenstein, and H. Schulzrinne. The Delay-Friendliness of TCP for Real-Time Traffic. IEEE/ACM Trans. on Networking, 18(5):1478–1491, 2010. [12] E. Brosh, S. A. Baset, D. Rubenstein, and H. Schulzrinne. The delay-friendliness of tcp. In Proc. ACM SIGMETRICS, pages 49–60, 2008. [13] M. Y. Chen, T. Sohn, D. Chmelev, D. Haehnel, J. Hightower, J. Hughes, A. LaMarca, F. Potter, I. Smith, and A. Varshavsky. Practical Metropolitan-Scale Positioning for GSM Phones. In Proc. UbiComp, volume 4206 of LNCS, pages 225–242, 2006. [14] R. deGraaf, J. Aycock, and M. J. Jacobson. Improved Port Knocking with Strong Authentication. Proc. Annual Computer Security Applications Conf., pages 451–462, 2005. [15] S. Dey, N. Roy, W. Xu, R. R. Choudhury, and S. Nelakuditi. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. In Proc. ISOC NDSS, Feb. 2014. [16] K. Dufková, M. Ficek, L. Kencl, J. Novak, J. Kouba, I. Gregor, and J. Danihelka. Active GSM Cell-id Tracking: “Where Did You Disappear?”. In Proc. ACM Intl. Wrkshp on Mobile Entity Localization and Tracking in GPS-less Environments, pages 7–12, 2008. [17] N. Eagle and A. Pentland. Reality Mining: Sensing Complex Social Systems. Personal and Ubiquitous Computing, 10(4):255–268, 2006. [18] M. Fatemi, S. Salimi, and A. Salahi. Anonymous roaming in universal mobile telecommunication system mobile networks. IET Information Security Journal, 4(2):93–103, 2010. [19] H. Federrath, A. Jerichow, D. Kesdogan, and A. Pfitzmann. Security in Public Mobile Communication Networks. In Proc. IFIP/TC6 Personal Wireless Communications, pages 105–116, April 1995. [20] H. Federrath, A. Jerichow, and A. Pfitzmann. MIXes in Mobile Communication Systems: Location Management with Privacy. In Proc. Intl. Wrkshp on Information Hiding, pages 121–135, 1996. [21] M. Ficek. Tracking Users in Mobile Networks: Data Acquisition Methods and their Limits. PhD thesis, Czech Technical University in Prague, https://dspace.cvut.cz/bitstream/handle/10467/18881/ C ONCLUSION We proposed ZipPhone, a method for obtaining location privacy without the active cooperation of the carriers that control the cellular infrastructure. ZipPhone is backwardscompatible and designed to allow new IMSI identifiers to be re-issued relatively frequently over the air. A cooperative but untrusted MVNO can easily support ZipPhone by issuing ephemeral identities and session keys, and it is less vulnerable to many attacks that are possible against PeerPhone, a peer-based version of ZipPhone. PeerPhone can be deployed without the logistics of managing a relationship with an MNO, but is more vulnerable to attacks. We also propose a method of thwarting attacks that prod the user to associate with cells based on fake pages. Our solution is an application of portknocking. Our empirical analysis of the ZipPhone’s protection against passive attacks by a carrier points out the limitations of results in a previous study [41]. That work assumed an always-update policy which is too costly for carriers to implement in practice. Our simulation of a forming LA update shows that ZipPhone users that update identifiers hourly can expect to be deanonymized only 6% of the time, which is less than a sixth of the rate reported by previous work. In future work, we plan to quantify ZipPhone’s protection against other inference algorithms, using additional data sets. We also plan to quantify the success of attacks that determine which phones are using ZipPhone (or page knocking defenses). And we plan to quantify the success of active attackers that localize the user without the user’s participation, and quantify the costs to the carrier for launching such attacks. Acknowledgements. This work was supported in part by NSF award CNS-0905349. 10 [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] TEZE Diserta%C4%8Dn%C3%AD%20pr%C3%A1ce Ficek Michal 2013.pdf, June 2013. M. Ficek, T. Pop, and L. Kencl. Active tracking in mobile networks: An in-depth view. Computer Networks, 57(9):1936 – 1954, 2013. J. Freudiger, R. Shokri, and J.-P. Hubaux. On the Optimal Placement of Mix Zones. In Proc. PETS, pages 216–234, Aug. 2009. P. Golle and K. Partridge. On the anonymity of home/work location pairs. In Proc. Intl. Conf. on Pervasive Computing, pages 390–397, 2009. A. Görlach, A. Heinemann, and W. Terpstra. Survey on Location Privacy in Pervasive Computing. In Privacy, Security and Trust within the Context of Pervasive Computing, volume 780 of The Intl. Series in Engineering and Computer Science, pages 23–34. 2005. M. Gorlatova, R. Aiello, and S. Mangold. Managing base station location privacy. In Proc. MILCOM, pages 1201–1206, Nov. 2011. M. Gorlatova, R. Aiello, and S. Mangold. Managing location privacy in cellular networks with femtocell deployments. In Proc. WiOpt Symposium, pages 418–422, May 2011. S. Isaacman, R. Becker, R. Cáceres, S. Kobourov, M. Martonosi, J. Rowland, and A. Varshavsky. Identifying Important Places in People’s Lives from Cellular Network Data. In Proc. Intl. Conf. on Pervasive Computing, pages 133–151, 2011. Y. Jiang, C. Lin, X. Shen, and M. Shi. Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks. IEEE Trans. on Wireless Communications, 5(9):2569– 2577, 2006. D. Kesdogan, H. Federrath, A. Jerichow, and A. Pfitzmann. Location Management Strategies Increasing Privacy in Mobile Communication. In Information Systems Security, pages 39–48. 1996. H. Kido, Y. Yanagisawa, and T. Satoh. An anonymous communication technique using dummies for location-based services. In Proc. Intl. Conf. on Pervasive Services, pages 88–97, 2005. J. Krumm. Inference Attacks on Location Tracks. In Proc. Intl. Conf. on Pervasive Computing, pages 127–143, May 2007. J. Krumm. A survey of computational location privacy. Personal Ubiquitous Comput., 13(6):391–399, Aug. 2009. M. Krzywinski. Port Knocking: Network Authentication Across Closed Ports. In SysAdmin Magazine, volume 12, pages 12–17. 2003. D. F. Kune, J. Koelndorfer, N. Hopper, and Y. Kim. Location leaks on the GSM Air Interface. In Proc. ISOC NDSS, Feb. 2012. M. Liberatore, B. Gurung, B. N. Levine, and M. Wright. Empirical Tests of Anonymous Voice Over IP. Elsevier Journal of Network and Computer Applications, 34(1):341–350, January 2011. C. Y. Ma, D. K. Yau, N. K. Yip, and N. S. Rao. Privacy vulnerability of published anonymous mobility traces. In Proc. MobiCom, pages 185–196, 2010. J. Meyerowitz and R. Roy Choudhury. Hiding Stars with Fireworks: Location Privacy Through Camouflage. In Proc. Annual Intl. Conf. on Mobile Computing and Networking, pages 345–356, 2009. I. Miers, C. Garman, M. Green, and A. D. Rubin. Zerocoin: Anonymous Distributed E-Cash from Bitcoin. In Proc. IEEE Symposium on Security and Privacy, pages 397–411, 2013. Mobile Europe. Deutsche telekom upgrades mobile network security with a5/3 encryption standard. http://www.mobileeurope.co.uk/PressWire/deutsche-telekom-upgrades-mobile-network-security-witha5-3-encryption-standard, December 2013. Y. D. Mulder, G. Danezis, L. Batina, and B. Preneel. Identification via Location-profiling in GSM Networks. In Proc. ACM Wrkshp on Privacy in the Electronic Society, pages 23–32, 2008. S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. http://www.bitcoin.org/bitcoin.pdf, 2009. M. F. Nowlan, N. Tiwari, J. Iyengar, S. O. Aminy, and B. Fordy. Fitting square pegs through round pipes: Unordered delivery wirecompatible with tcp and tls. In Proc. USENIX NSDI, pages 28–28, 2012. J. Park, J. Go, and K. Kim. Wireless authentication protocol preserving user anonymity. In Proc. SCIS, pages 159–164, 2001. [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] A. Polak, S. Dolathshahi, and D. Goeckel. Identifying Wireless Users via Transmitter Imperfections. IEEE JSAC: Special Issue on Advances in Digital Forensics for Communications and Networking, 29(7):1469–1479, August 2011. A. Polak and D. Goeckel. RF Fingerprinting of Users who Actively Mask Their Identities with Artificial Distortion. In Proc. Asilomar Conf. on Signals, Systems, and Computers, May 2011. J. Rao, P. Rohatgi, H. Scherzer, and S. Tinguely. Partitioning attacks: or how to rapidly clone some GSM cards. In IEEE Symp. Security and Privacy, pages 31–41, 2002. S. M. Razavi. Tracking Area Planning in Cellular Networks [Elektronisk resurs] : Optimization and Performance Evaluation. Linköping, 2011. M. G. Reed, P. F. Syverson, and D. M. Goldschlag. Protocols using anonymous connections: Mobile applications. In Security Protocols, volume 1361 of LNCS, pages 13–23. 1998. J. Scahill and G. Greenwald. The NSA’s Secret Role in the U.S. Assassination Program. https://firstlook.org/theintercept/article/2014/ 02/10/the-nsas-secret-role/, 10 Feb 2014. B. Schneier. The eternal value of privacy. Wired, May 2006. Security Research Labs. Gsm map project: gsm security country report (usa). http://gsmmap.org/assets/pdfs/gsmmap.org-country report-United States of America-2013-08.pdf, August 2013. R. Shokri, G. Theodorakopoulos, G. Danezis, J.-P. Hubaux, and J.-Y. Boudec. Quantifying Location Privacy: The Case of Sporadic Location Exposure. In Proc. PETS, pages 57–76, Aug. 2011. C. Smith and D. Collins. 3G Wireless Networks. 2nd edition, 2007. H. Soroush, K. Sung, E. Learned-Miller, B. N. Levine, and M. Liberatore. Disabling GPS is Not Enough: Cellular location leaks over the Internet. In Proc. PETS, pages 103–122, July 2013. C. Timberg and A. Soltani. By cracking cellphone code, NSA has capacity for decoding private conversations. http://www.washingtonpost.com/business/technology/bycracking-cellphone-code-nsa-has-capacity-for-decodingprivate-conversations/2013/12/13/e119b598-612f-11e3-bf4561f69f54fc5f story.html, December 13 2013. E. Trevisani and A. Vitaletti. Cell-ID Location Technique, Limits and Benefits: An Experimental Study. In Proc. IEEE Wrkshp on Mobile Computing Systems and Applications, pages 51–60, 2004. A. Varshavsky, M. Chen, E. de Lara, J. Froehlich, D. Haehnel, J. Hightower, A. LaMarca, F. Potter, T. Sohn, K. Tang, and I. Smith. Are GSM Phones THE Solution for Localization? In Proc. Wrkshp Mobile Computing Systems and Applications, pages 34–42, 2006. S. von Watzdorf and F. Michahelles. Accuracy of Positioning Data on Smartphones. In Proc. Intl. Wrkshp on Location and the Web, pages 2:1–2:4, 2010. Wikipedia. List of us mobile mvnos. Last checked 201312-31. http://en.wikipedia.org/wiki/List of United States mobile virtual network operators. V. W.-S. Wong and V. C. Leung. Location Management for Nextgeneration Personal Communications Networks. IEEE Network, 14(5):18–24, Sept. 2000. J. Wortham. Cellphones Now Used More for Data Than for Calls. http://www.nytimes.com/2010/05/14/technology/personaltech/ 14talk.html, May 13 2010. T. Xu and Y. Cai. Feeling-based Location Privacy Protection for Location-based Services. In Proc. ACM CCS, pages 348–357, 2009. G. Yang, D. Wong, and X. Deng. Efficient anonymous roaming and its security analysis. In Applied Cryptography and Network Security, volume 3531 of LNCS, pages 334–349. 2005. H. Zang and J. Bolot. Anonymization of Location Data Does Not Work: A Large-scale Measurement Study. In Proc. ACM MobiCom, pages 145–156, 2011. X. Zhang and H. Schulzrinne. Voice over tcp and udp. Technical Report CUCS-033-04, Columbia University, 2004. J. Zhu and J. Ma. A new authentication scheme with anonymity for wireless environments. IEEE Trans. on Consumer Electronics, 50(1):231–235, 2004.